Description
Multiple cross-site scripting (XSS) vulnerabilities in Xavi X7968 allow remote attackers to inject arbitrary web script or HTML via the (1) pvcName parameter to webconfig/wan/confirm.html/confirm or (2) host_name_txtbox parameter to webconfig/lan/lan_config.html/local_lan_config.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Busindre · textwebappshardware
https://www.exploit-db.com/exploits/36865
exploitdb
WORKING POC
VERIFIED
by Busindre · textremotehardware
https://www.exploit-db.com/exploits/36866
References (4)
Core 4
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/52098
Exploit x_refsource_misc
http://packetstormsecurity.org/files/109987/Xavi-7968-ADSL-Router-Cross-Site-Request-Forgery-Cross-Site-Scripting.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/73353
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/48050
Scores
EPSS
0.0934
EPSS Percentile
92.8%
Details
CWE
CWE-79
Status
published
Products (1)
xavi/x7968
Published
Oct 08, 2012
Tracked Since
Feb 18, 2026